Ace CompTIA Security+ Certification Exam
CompTIA Security+ Bootcamp
Ace CompTIA Security+ Certification Exam with
-
Live Mentor Sessions with Industry Experts
-
Mind Maps & Exam-Taking Strategies
-
Dedicated Question Bank & 2 Mock Exams
-
Free Exam Voucher worth USD 392
USD 1800 USD 1250
CompTIA Security+ Bootcamp is offered and delivered by Great Learning
Curriculum
The PG Program in Cybersecurity comprises 4 milestones: a strong foundation in cybersecurity, in-depth exploration of various cyber attacks, designing security controls for resilience, and practicing incident response using provided playbooks. The final section focuses on investigating attacks.
- 250+ hours of learning content
- 4+ Cybersecurity Frameworks
Pre-work (Optional)
This course is suitable for individuals with limited experience in IT and Technology or those outside these fields. It provides the essential fundamentals needed for the program, enabling a streamlined learning journey.
Understanding Cyber Attacks - 4 Weeks
Discover cutting-edge advancements in cybersecurity and gain insights into organizational-level management of such attacks.
Topics
- MITRE ATT&CK Framework
- Threat Tactics
- Malware
- Attack Kill Chain
- Attack Vectors
- Deep dive into Dark Web
- Physical Attacks
- Indicators of Compromise
- Tactics Techniques and procedures
- Case Study: Not Petya Solarwinds, Colonial Pipeline, Olympic games
- Attack Groups- Unit 8200, Nobelium, APT 29
Key takeaways
- Understand the different types of Cyberattacks and the risks they pose
- Familiarize yourself with the types of threats and the threat actors
- Delve deeper insight into the Tactics Techniques and Procedures (TTP) used by the adversaries
- Understand the structure of an attack- Kill chain methodology
- Apply cyberattack and threat concepts to analyze the Solarwinds and Colonial Pipeline attacks
Designing Security Controls - 4 Weeks
Discover effective methods for recognizing and applying appropriate cybersecurity strategies to combat diverse cyber threats.
Topics
- Firewalls
- Web Application Firewalls
- IDS/IPS
- Antivirus & EDR
- Email Protection
- Data Loss Prevention
- Vulnerability Management
- Zero-Day Vulnerability
- Patching
- System Audit
- Maintenance, Monitoring, and Analysis of Audit Logs
- SIEM (Security Information and Event Management)
- Incident Investigation
- Threat Intelligence
Key takeaways
- Understand the controls that help in detecting security threats.
- Develop a deeper understanding of SIEM and its purpose.
- Acquaint yourself with reviewing, interpreting, and comprehending computer-generated logs
- Learn how cyber threat intelligence helps in assessing security threats
- Gain knowledge on Network Firewall and Web application Firewall
- Familiarize yourself with Antivirus and its applications
- Understand and practice shell scripting.
Security Operations & Incident Management - 4 Weeks
Acquire the skills to utilize an Incident Response Playbook to safeguard crucial digital assets and defend against ongoing cyber-attacks effectively.
Topics
- Incident Response and playbooks
- NIST Framework
- The Golden Hour
- Log and Email analysis
- Writing Incident Reports
- Security Operations Centre – A Deep dive
- SLAs KRIs, KPI
- Maintenance, Monitoring, and Analysis of Audit Logs
- Recovery from an Incident
- Forensics
Key takeaways
- Learn how to read, write and examine incident reports.
- Learn about the Incident response lifecycle of NIST
- Familiarize yourself with the concept of the Golden hour.
- Understand how to examine incident data in order secure it from cyber threats using forensics
- Gain knowledge on the tasks performed at a Security Operations Center (SOC)
- Learn to form a recovery strategy from a cyber-attack
Cyber Range
Learn from 20+ self-paced incidents and practice cyber security tools, techniques, and procedures. These scenarios test detection, protection, and investigation skills.
Key Takeways
- The Cyber Range offers over 20 self-paced incidents, providing learners with exposure to a wide array of tools, techniques, and procedures.
- These scenarios will challenge participants to apply their knowledge and expertise in detecting, protecting, and investigating cybersecurity events.
Self-Paced Module
Explore the concept and functioning of ChatGPT and explore its impact on work, business, and education. Discover prompt engineering techniques to customize outputs for specific purposes.
Demystifying ChatGPT and Applications
- Overview of ChatGPT and OpenAI
- Timeline of NLP and Generative AI
- Frameworks for understanding ChatGPT and Generative AI
- Implications for work, business, and education
- Output modalities and limitations
- Business roles to leverage ChatGPT
- Prompt engineering for fine-tuning outputs
- Practical demonstration and a bonus section on RLHF
Capstone Project (Optional)
Showcase your knowledge gained from the program through a comprehensive capstone project.
Key takeaways
- The Capstone project challenges you to demonstrate your skill & knowledge
- You will use a combination of Hands-on skill and security research capability
Learn in-demand Cybersecurity Tools
Master latest tools and languages used by cybersecurity specialists
Meet your UT Faculty and Industry Experts
Learn from the top, world-renowned faculty at UT Austin
Dr. Kumar Muthuraman
Faculty Director - Centre for Research and Analytics
20+ Years Work Experience
Ian
Insider Risk Manager
30+ Years Work Experience
Ivan
Cyber Threat Engineer
10+ Years Work Experience
James
Cybersecurity Instructor
25+ Years Work Experience
Amin
Cloud Solutions Architect, Security, DevOps
25+ Years Work Experience
The Great Learning Advantage
Gain industry expertise from renowned academics and professionals. Hands-on projects and lab sessions go beyond theoretical concepts, ensuring practical knowledge. Stay motivated and on track with personalized support from program managers, and expand your network through valuable connections.
Gain industry expertise from renowned academics and professionals. Hands-on projects and lab sessions go beyond theoretical concepts, ensuring practical knowledge. Stay motivated and on track with personalized support from program managers, and expand your network through valuable connections.
BUILD YOUR CYBERSECURITY EXPERTISE
Learn from Industry Leaders
- Curated content featuring renowned academics and industry leaders, blending theoretical knowledge with practical examples and demonstrations
- Interactive mentor sessions led by industry professionals, offering concept revision, doubt clarification, and case-based learning opportunities
GAIN REAL-WORLD INSIGHTS
Hands-on, Practical Training
- Lab sessions to learn real-world applications of concepts
- Case Studies, 8 lab sessions and 12+ projects that help implement concepts
- Optional Capstone project to consolidate your learnings
TAILORED LEARNING EXPERIENCE
Personalized Support and Guidance
- Get personalized assistance with a dedicated Program Manager
- Feedback on submissions and periodic interaction with your program manager to ensure you stay motivated and on track
Who is this program for?
The Post Graduate program in cybersecurity empowers you to align your learning with your professional aspirations, whether you aim to pursue a cybersecurity career or advance as a strategic leader.
Young professionals:
Learn the core concepts of cybersecurity and build a solid foundation using the in-demand market skills. You will benefit from this if you are:
- A professional looking to transition their career in cybersecurity.
- A fresh graduate wanting to break into the cyber security domain.
Senior and mid-level managers:
Enhance your expertise in safeguarding IT and Cloud infrastructures with advanced cybersecurity skills, preparing you to adeptly navigate and mitigate evolving digital threats.
- An IT infrastructure manager wanting to upskill with cybersecurity
- A senior and mid-level manager involved in cybersecurity governance and decision making for your organization
Why Our Learners Choose the Post Graduate Program in Cybersecurity
I have spent the last 20 years working in Healthcare and made the decision to change careers. After lots of research, I decided on Cybersecurity. This is a growing field that will provide lots of opportunities in the future for myself. Great Learning has provided me with the education needed to take this next step forward in to a new career. Along with the lectures, the provided lab environment allows me to perform hands on activities to further my learning. This is invaluable to me as I am a hands on type of learner.
Jamie Washington
Respiratory therapist, Athens Limestone Hospital
Since the start of registration to the end of the program, the faculty and staff at Great Learning have been extremely engaging. All expectations and deadlines were always clearly communicated. Lectures and content materials were clear and supremely relevant to current industry standards, and this helped me be successful in obtaining a few different industry certifications well before graduating. With 80% of the content centered around Security+ content, paired with hands-on labs and projects, not only will I walk away with meaningful connections but also with a solid portfolio and heightened skillset. If you're looking for a sign, this is it!
Sable R. Banks
Cybersecurity & Digital Forensics Intern,
Cyber Secured India
This program has been a great learning experience. I am really pleased with the trainers and the criteria. The hands-on labs are excellent and will really teach you a lot. I recommend taking this program with Great Learning.
Troy Marshall
Systems Support Specialist III, Texas Water Development Board
Having heard a lot about this field, I decided to challenge myself with the PGPCS program. The lab sessions have been an intriguing revelation. My awareness in cybersecurity is now backed by concrete practical studies. It has been great with Great Learning.
Eric Aggrey-Quashie
Colonel, Ghana Armed Forces
I really enjoyed taking the Great Learning PostGraduate Cyber Security Course in Winter 2022! I have been in the IT industry for 20+ years but recently pivoted to Cyber Security as a specialty. Although I was familiar with many of the concepts, I lacked the in-depth understanding of the full landscape of cybersecurity. Using this course, I was able to get a lot of background on how attacks occur, how to defend against them, and it has better prepared me for my career as a Sales Engineer at a major cybersecurity software vendor. I would recommend this course to anyone new in their career, or new to cybersecurity.
Jason Burroughs
Sr Sales Engineer,
Splunk
As a legal professional, I highly recommend PGPCS. The program is a great option for a 21st Century lawyer. It has noticeably helped me gauge how cyber criminals plan and execute their malicious activities.
Modicai Donga
Chief Operations Manager/Lawyer, SV MDLADLA AND ASSOCIATES
The Post Graduate Program in Cybersecurity has gone far beyond my expectations. The self-paced course allows me to accurately understand the concepts. I feel confident that after completing this program, I can begin a career in cybersecurity.
Kristen Sharp
General Director, Loc’VTT Sanc’R
After being in the security space for 3 years, I realized that I didn't have any hands-on experience which is an important requirement for a cybersecurity expert. The PGPCS program ensures that the students have a great experience.
Asuzu Oluchukwu Justina
Head, Operational Resilience, AXA Mansard
What I liked about PGPCS was the structure and content. Though cybersecurity is mile wide and a foot deep, I found that the pace, combination of classes and assignments helped me learn all concepts quite seamlessly.
Sri Arepally
Platform Engineering , DataTechies
Program Fees
Post Graduate Program in Cybersecurity
2,950 USD
Certificate from
- High-quality learning content from UT Austin & Global Faculty
- Live Mentored Learning in Micro-classes (up to 30 learners)
- Get personalized assistance with a dedicated Program Manager
Apply Now
Start learning cybersecurity with easy monthly installments, with flexible payment tenures as per your convenience. Reach out to the admissions office at +1 512-212-4186 to know more.
*Subject to approval by payment partners based on applicable regions & eligibility. e.g: dLocal - applicable for learners from Brazil, Colombia & Mexico only
Admission Process
- Step 1: Apply
Apply by filling a simple online application form
- Step 2 : Screening process
Attend an application screening call
- Step 3 : Join Program
An offer letter will be rolled out to selected candidates. Secure your seat by paying the admission fee
Upcoming Application Deadline
Our admissions close once the requisite number of participants enroll for the upcoming batch. Apply early to secure your seat
Deadline: 21st Nov 2024
Apply Now
Cohort Start Dates
Online
To be announced
Frequently Asked Questions
Program Details
What is the Cybersecurity course from The University of Texas at Austin’s McCombs School of Business?
The University of Texas at Austin’s (UT Austin) McCombs School of Business offers a Post Graduate Program in Cybersecurity that equips students with the knowledge and skills required to interpret cyber attacks and create reliable Cybersecurity systems using real-world resources and industry standards. The course is taught using a mix of engaging lectures, hands-on lab sessions, and a capstone project.
Students will have the chance to use their newly acquired knowledge to address current cybersecurity problems. They also gain access to committed mentors and career advice to aid in their transition into a lucrative career in Cybersecurity. The course is a fantastic way to network with thought leaders in the field and learn how to secure digital infrastructure for those passionate about cyber defense.
What is the ranking of The University of Texas at Austin (UT Austin)?
UT Austin is ranked #6 university worldwide in the category of Executive Education - Custom Programs by Financial Times 2022 rankings and ranked #6 in the category of Information Systems Graduate Programs by the U.S. News & World Report 2022.
Does this program include a capstone project?
Yes, at the end of this Cybersecurity course, students will have the option to execute a 2-week capstone project. Practitioners and decision-makers are taken into consideration when choosing the capstone project.
Learners can showcase their abilities and knowledge through the capstone project. They will make use of a combination of hands-on knowledge and expertise from security research.
(Note: However, it is optional for students to take the capstone project.)
Who would be the faculty to teach this program?
The faculty members are highly accomplished academicians and practitioners in the field of Cybersecurity from UT Austin McCombs School of Business and other prestigious companies like EY and Ignite Technologies, among many others.
What is the role of Great Learning in this program?
Great Learning collaborates with UT Austin McCombs School of Business and provides industry experts, student counselors, dedicated program support, and guidance to ensure students get hands-on training and live personalized mentorship on applying concepts taught by UT Austin and other faculty members.
The services include:
- A dedicated program manager will monitor your learning progress throughout the program.
- You will receive feedback on your submissions and regular communication with your program manager to keep you motivated and on track.
- You will receive timely resolutions to all inquiries, both academic and non-academic.
What are the minimum system requirements for the program?
The coursework comprises live and self-paced hands-on activities. For the self-paced hands-on activities, ensure the following minimum recommended system specifications are met.
For Windows OS:
- Processor (CPU): Multi-core Processor (quad-core or higher processor). E.g., Intel Core i5 or AMD Ryzen 5
- RAM: 8 GB
- Storage: 256 GB (SSD recommended)
- Operating system specification: A 64-bit version of Windows 10 (or above) is recommended as the host operating system. [Note: Windows 10 Home edition is not supported]
- CPU should support virtualization technology (Intel VT-x or AMD-V)
For Mac OS:
- Processor (CPU): Multi-core Processor (quad-core or higher processor). E.g., Intel Core i5 or higher.
- RAM: 8 GB
- Storage: 256 GB (SSD recommended)
- Operating system specification: MacOS version that supports virtualization. Eg. macOS 10.13 High Sierra and later
Eligibility Criteria
What are the eligibility criteria for enrolling in this Cybersecurity course from UT Austin McCombs School of Business?
Applicants should have 1+ years of work experience in the IT domain. For graduates & non-IT candidates, we offer a free pre-work course to build your fundamentals in hardware, operating systems, virtualization, databases, & cloud essentials.
Fee Related Queries
What is the course fee to pursue this Post Graduate in Cybersecurity from UT Austin McCombs School of Business?
The University of Texas at Austin’s (UT Austin) McCombs School of Business offers a Post Graduate Program in Cybersecurity that equips students with the knowledge and skills required to interpret cyber attacks and create reliable Cybersecurity systems using real-world resources and industry standards. The course is taught using a mix of engaging lectures, hands-on lab sessions, and a capstone project.
Students will have the chance to use their newly acquired knowledge to address current cybersecurity problems. They also gain access to committed mentors and career advice to aid in their transition into a lucrative career in Cybersecurity. The course is a fantastic way to network with thought leaders in the field and learn how to secure digital infrastructure for those passionate about cyber defense.
Delivered in Collaboration with:
The University of Texas at Austin is collaborating with Great Learning to deliver PG Program in Cybersecurity. Great Learning is an ed-tech company that has empowered learners from over 170+ countries in achieving positive outcomes for their career growth.